WebDB

mWebDB is a forms based solution that mobilises existing or new corporate database applications by enabling users to view, synchronize, edit and update SQL database information from mobile devices, laptop/desktops. Customised mobile solutions can be created in a point and click environment in a few short hours.

User support

We can provide a range of support from 9-5 Monday to Friday or extended daily support from 8-10 pm Monday to Friday or 24 x 7 support

User can manage status and priority of support tickets

Yes

Online ticketing support accessibility

None or don’t know

Phone support

Yes

Phone support availability

9 to 5 (UK time), 7 days a week

Web chat support

Web chat

Web chat support availability

24 hours, 7 days a week

Web chat support accessibility standard

WCAG 2.0 AAA

Web chat accessibility testing

Can use any testing methodology that is supported by the force.

Onsite support

Yes, at extra cost

Support levels

Annual support and maintenance is charged in advanced for the year based on the number of users and covers system updates and product maintenance that covers upgrades to new operating system updates. We also work with our customer base to provide with two update product releases that add new features. this service is provided on a discounted cost basis above annual support and maintenance. All support is remote.

Support available to third parties

Yes

Onboarding and offboarding

Onboarding and offboarding

Getting started

A series of customer designed online training tools have been developed to assist new customers. As each customer operates under a difference set of business rules and models these can be used as a guide to establish a new customers training criteria.

In general there is little training that is required to use the application given that the existing user will have prior knowledge of how to use the desktop versions of the mobile applications.

Service documentation

Yes

Documentation formats

HTML

PDF

End-of-contract data extraction

Their data is not stored in our SaaS as all data that is entered in the mobile client is uploaded as soon as the user presses the send key given that they a have a mobile on-line connection. Data is only stored in the police forces databases and not as stated in the SaaS.

End-of-contract process

There are no additional costs for end of service.

Using the service

Using the service

Web browser interface

Yes

Supported browsers

Internet Explorer 7

Internet Explorer 8

Internet Explorer 9

Internet Explorer 10+

Microsoft Edge

Firefox

Chrome

Safari 9+

Opera

Application to install

Yes

Compatible operating systems

Android

IOS

Windows

Windows Phone

Designed for use on mobile devices

Yes

Differences between the mobile and desktop service

The same functionality is provided on both platforms. A thick on device client is installed for use on a mobile device or windows tablet. On a desktop the application uses a browser to access the application.

Accessibility standards

None or don’t know

Description of accessibility

We provide a web link to down load the desktop or mobile client and the application server client that will be a SaaS

Accessibility testing

Tests have been completed on a range of mobile device and operating systems in the UK and also in Canada. We support a range of operating systems and versions that are two many to list here but we can answer those questions as and when they arise.

API

Yes

What users can and can't do using the API

As the application is based on custom code base we provided dedicated api's based on the customers requirements and needs.

API documentation

Yes

API documentation formats

HTML

PDF

API sandbox or test environment

Yes

Customisation available

Yes

Description of customisation

The service can be customised but not by the users but only through oursleves

Scaling

Scaling

Independence of resources

IPatrol has been tested over many years as to user numbers and server up times and there are no effects on either count to effect a users experience.

Analytics

Analytics

Service usage metrics

Yes

Metrics types

These are available and are specified by the customer

Reporting types

Reports on request

Resellers

Resellers

Supplier type

Not a reseller

Staff security

Staff security

Staff security clearance

Conforms to BS7858:2012

Government security clearance

Up to Developed Vetting (DV)

Asset protection

Asset protection

Knowledge of data storage and processing locations

Yes

Data storage and processing locations

United Kingdom

User control over data storage and processing locations

Yes

Datacentre security standards

Supplier-defined controls

Penetration testing frequency

At least once a year

Penetration testing approach

In-house

Protecting data at rest

Physical access control, complying with another standard

Data sanitisation process

No

Equipment disposal approach

A third-party destruction service

Data importing and exporting

Data importing and exporting

Data export approach

They do not as it connect to the users back end systems that reside behind their own firewall.

Data export formats

Other

Other data export formats

Non possible

Data import formats

Other

Other data import formats

Not required

Data-in-transit protection

Data-in-transit protection

Data protection between buyer and supplier networks

TLS (version 1.2 or above)

IPsec or TLS VPN gateway

Data protection within supplier network

TLS (version 1.2 or above)

IPsec or TLS VPN gateway

Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience

Guaranteed availability

SLA's are provided on a customer by customer basis. As one example one customer required that is SLA's were not achieved then a deduction of the annual maintenance allowance would be withheld.

Approach to resilience

Its available on request

Outage reporting

Can be interfaced to third party tool sets via API's

Identity and authentication

Identity and authentication

User authentication needed

Yes

User authentication

2-factor authentication

Dedicated link (for example VPN)

Username or password

Access restrictions in management interfaces and support channels

Access is defined according to user defined roles and controlled usually in conjunction with Microsoft Active Directory (AD) defined roles. This is done in conjunction with the customers requirements where necessary

Access restriction testing frequency

At least once a year

Management access authentication

2-factor authentication

Dedicated link (for example VPN)

Username or password

Audit information for users

Audit information for users

Access to user activity audit information

Users have access to real-time audit information

How long user audit data is stored for

User-defined

Access to supplier activity audit information

Users contact the support team to get audit information

How long supplier audit data is stored for

User-defined

How long system logs are stored for

User-defined

Standards and certifications

Standards and certifications

ISO/IEC 27001 certification

No

ISO 28000:2007 certification

No

CSA STAR certification

No

PCI certification

No

Other security accreditations

No

Security governance

Security governance

Named board-level person responsible for service security

Yes

Security governance accreditation

Yes

Security governance standards

ISO/IEC 27001

Information security policies and processes

These are available on request

Operational security

Operational security

Configuration and change management standard

Supplier-defined controls

Configuration and change management approach

All change management is defined and discussed with the customer as required by the level of their standard set usually with a UK police force.

Vulnerability management type

Supplier-defined controls

Vulnerability management approach

In conjunction with our customers we seek to operate three systems covering demonstration, UAT and live and through these three systems we coordinate with the customer when and how and what patches need to be released when approved by the customer from UAT to live. The potential threats if any are informative by the customer and monitoring tools.

Protective monitoring type

Undisclosed

Protective monitoring approach

We respond is accordance with the degree of urgency that is required by the customer to address any issues that arise.

Incident management type

Undisclosed

Incident management approach

We have a customer portal that allows for direct reporting of any and all issues that generate incident reports to the support team for immediate response.

Secure development

Secure development

Approach to secure software development best practice

Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks

Connection to public sector networks

Yes

Connected networks

Public Services Network (PSN)

Police National Network (PNN)

Pricing

Pricing

Price

£1250 to £1250 per instance per year

Discount for educational organisations

No

Free trial available

Yes

Description of free trial

Full system for 25 users for 3 months from day of the connection being operational.